SlideShare une entreprise Scribd logo
1  sur  88
DATA COMMUNICATION & INTERNET
FEBRUARY 2013

By Eng. Anuradha Udunuwara,
BSc.Eng(Hons), CEng, MIE(SL), MEF-CECP, MBCS, ITILv3 Foundation, MIEEE, MIEEE-CS, MIEE, MIET, MCS(SL), MSLAAS
Agenda
2


    Introduction                                           Access Technologies
    OSI Model and Protocols                                      a. Analog Dial Access
                                                                 b. ISDN Access
          a. Data Link Protocols – FR, ATM, PPP
                                                                 c. Broadband Access
          b. Network Protocols - IP
                                                                 d. ADSL Technology
          c. Transport Protocols – TCP
                                                                 e. Data circuits
          d. Application Protocols - SMTP, FTP
                                                                 f. VPN


    LAN WAN Technologies                                   Internet Applications
          a. LAN Networking                                      a. Electronic mailing
          b. WAN IP Routing                                      b. Web on Internet
          c. WAN Switching                                       c. Intranets
          d. LAN Bridging                                        d. Extranets
          f. VPN Technology                                      e. E-commerce
          g. MPLS
                                                  (C) Anuradha Udunuwara
INTRODUCTION
Why a network?
4




                     CSP Network                Subscriber/
     services                                   customer/
                                                user



                Customers don’t buy networks
                       (C) Anuradha Udunuwara
The network lifecycle
5




      Strategy &     Planning &                Projects &     Operations &
      Architecture   Designing               Implementation   Maintenance




                                  (C) Anuradha Udunuwara
OSI MODEL AND
PROTOCOLS
   King of England                         King of France
        Scriber                                  Scriber
       Translator                               Translator
       Negotiator                               Negotiator
        Manager                                 Manager
       Mail room                                Mail room
        Envelop                                  Envelop
        Delivery                                 Delivery




                    (C) Anuradha Udunuwara          7
Please Do Not Throw Sausage Pizza Away

              User A
8


                                                      User B
    Layer 7   Application                             Application
              Presentation                            Presentation
                Session                                 Session
               Transport                               Transport
                Network                                 Network
               Data Link                               Data Link
    Layer 1     Physical                                Physical

                             (C) Anuradha Udunuwara
OSI model
9




       prescription of characterizing and standardizing the
        functions of a communications system in terms of
        abstraction layers (a way of hiding the implementation
        details of a particular set of functionality)
       Similar communication functions are grouped into logical
        layers
       A layer serves the layer above it and is served by the
        layer below it
                              (C) Anuradha Udunuwara
TCP/IP vs. OSI
10




     Source: http://webpage.pace.edu/ms16182p/networking/protocols.html
                                        (C) Anuradha Udunuwara
11




     Source : http://ccna-cisco.webs.com/osilayer.htm
                                          (C) Anuradha Udunuwara
12




     Source : http://www.telecomhall.com/osi-7-layers-model.aspx
                                        (C) Anuradha Udunuwara
13




     Source: http://webpage.pace.edu/ms16182p/networking/protocols.html
                                        (C) Anuradha Udunuwara
14




     Source : http://www.markwilson.co.uk/blog/2006/03/osi-reference-model-and-how-it-relates.htm
                                               (C) Anuradha Udunuwara
Core Network Evolution
15


        Synchronous
            Connection oriented
                       TDM
                              SDH
                              PDH
        Asynchronous
            Connection oriented
                X.25 (1976)
                FR(80s)
                ATM (90s)
                MPLS
            Connection-less
                Ethernet (1973~1976)
                IP (DoD Standard IP, RFC 760, Jan 1980)

                                                     (C) Anuradha Udunuwara
Data Link Layer
16




        protocol layer that transfers data between adjacent
         network nodes in a WAN or between nodes on the
         same LAN segment
        provides the functional and procedural means to
         transfer data between network entities and might
         provide the means to detect and possibly correct errors
         that may occur in the physical layer
        Ex: - ATM, L2TP, IEEE 802.3, Frame Relay, PPP, X.25
                               (C) Anuradha Udunuwara
ATM
17


        a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a
         complete range of user traffic, including voice, data, and video signals, and is designed to unify
         telecommunication and computer networks
        uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells
        differs from approaches such as the IP or Ethernet that use variable sized packets or frames
        provides data link layer services that run over a wide range of OSI physical Layer links
        has functional similarity with both circuit switched networking and small packet switched networking
        designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers),
         and real-time, low-latency content such as voice and video
        uses a connection-oriented model in which a virtual circuit must be established between two endpoints
         before the actual data exchange begins
        is a core protocol used over the SONET/SDH backbone of the PSTN and ISDN, but its use is declining in
         favor of all IP


                                                      (C) Anuradha Udunuwara
18




     Source: http://support.novell.com/techcenter/articles/nc1997_02c.html
                                        (C) Anuradha Udunuwara
ATM, cont.,
19




      Source: http://jonapchan.blogspot.com/2012/02/asynchronous-transfer-mode-atm.html

                                          (C) Anuradha Udunuwara
FR
20


        standardized WAN technology that specifies the physical and logical link layers of digital telecommunications channels using a
         packet switching methodology
        Originally designed for transport across ISDN infrastructure, it may be used today in the context of many other network
         interfaces
        Network providers commonly implement Frame Relay for voice (VoFR) and data as an encapsulation technique, used between
         LANs over a WAN
        Each end-user gets a private line (or leased line) to a FR node
        FR network handles the transmission over a frequently-changing path transparent to all end-user extensively-used WAN
         protocols
        less expensive than leased lines and that is one reason for its popularity
        extreme simplicity of configuring user equipment in a FR network offers another reason for FR’s popularity
        With the advent of Ethernet over fiber optics, MPLS, VPN and dedicated broadband services such as cable modem and DSL,
         the end may loom for the Frame Relay protocol and encapsulation
        many rural areas remain lacking DSL and cable modem services. In such cases the least expensive type of non-dial-up
         connection remains a 64-kbit/s frame-relay line



                                                              (C) Anuradha Udunuwara
FR, cont.,
21




      Source: http://en.wikipedia.org/wiki/Frame_Relay
                                      (C) Anuradha Udunuwara
FR, cont.,
22




      Source: http://feryjunaedi.wordpress.com/page/3/
                                     (C) Anuradha Udunuwara
PPP
23


        a data link protocol commonly used in establishing a direct connection between two
         networking nodes
        used over many types of physical networks including serial cable, phone line, trunk
         line, cellular telephone, specialized radio links, and fiber optic links such as SONET
        also used over Internet access connections (now marketed as "broadband")
        ISPs have used PPP for customer dial-up access to the Internet, since IP packets
         cannot be transmitted over a modem line on their own, without some data link
         protocol
        Two encapsulated forms of PPP, PPPoE and PPPoA, are used most commonly by
         Internet Service Providers (ISPs) to establish a DSL Internet service connection with
         customers


                                            (C) Anuradha Udunuwara
Network Layer
24


        responsible for packet forwarding including routing through intermediate routers
        provides the functional and procedural means of transferring variable length data sequences from a source to a destination
         host via one or more networks while maintaining the quality of service functions
        Functions of the network layer include:
             Connection model: connectionless communication
                  Example:- IP is connectionless, in that a datagram can travel from a sender to a recipient without the recipient having to send
                   an acknowledgement
             Every host in the network must have a unique address that determines where it is. This address is normally assigned from a
              hierarchical system, so you can be "Fred Murphy" to people in your house, "Fred Murphy, 1 Main Street" to Dubliners, or "Fred
              Murphy, 1 Main Street, Dublin" to people in Ireland, or "Fred Murphy, 1 Main Street, Dublin, Ireland" to people anywhere in the
              world. On the Internet, addresses are known as IP addresses
        Since many networks are partitioned into subnetworks and connect to other networks for wide-area communications, networks
         use specialized hosts, called gateways or routers to forward packets between networks
        Ex: -IPv4, IPv6, ARP, ICMP, IPSec, IGMP, IPX, AppleTalk


                                                                 (C) Anuradha Udunuwara
IP
25


        IP is the primary protocol in the Internet Layer of the Internet Protocol Suite
         and has the task of delivering packets from the source host to the
         destination host solely based on the addresses.
        For this purpose, IP defines datagram structures that encapsulate the data
         to be delivered
        also defines addressing methods that are used to label the datagram
         source and destination
        connectionless
        The first major version of IP, Internet Protocol Version 4 (IPv4), is the
         dominant protocol of the internet
        successor is Internet Protocol Version 6 (IPv6), which is increasing in use.
                                         (C) Anuradha Udunuwara
26




     Source: http://www.hill2dot0.com/wiki/index.php?title=IP_address
                                       (C) Anuradha Udunuwara
X.25
27




        an ITU-T standard protocol suite for packet switched
         WAN communication
        X.25 WAN consists of packet-switching exchange (PSE)
         nodes as the networking hardware, and leased lines,
         plain old telephone service connections or ISDN
         connections as physical links
        replaced by less complex protocols, especially the IP
                               (C) Anuradha Udunuwara
X.25, cont.,
28




     Source: http://sangoma.com/support/tutorials/x25.html
                                         (C) Anuradha Udunuwara
X.25, cont.,
29




       Source: http://www.cisco.com/en/US/docs/ios-xml/ios/wan_smxl/configuration/12-4t/wan-cfg-x25-lapb.html


                                                    (C) Anuradha Udunuwara
Transport Layer
30




        provides end-to-end communication services for
         applications within a layered architecture of
         network components and protocols
        provides convenient services such as connection-
         oriented data stream support, reliability, flow
         control, and multiplexing
        Ex:-TCP UDP
                              (C) Anuradha Udunuwara
TCP
31



        one of the two original components of the suite, complementing the
         IP, and therefore the entire suite is commonly referred to as TCP/IP
        provides reliable, ordered delivery of a stream of octets from a
         program on one computer to another program on another computer
        used by major Internet applications such as the WWW, email,
         remote administration and file transfer
        Other applications, which do not require reliable data stream
         service, may use the User Datagram Protocol (UDP), which provides
         a datagram service that emphasizes reduced latency over reliability


                                    (C) Anuradha Udunuwara
Application Layer
32




        an abstraction layer reserved for communications
         protocols and methods designed for process-to-process
         communications across a IP computer network.
        Application layer protocols use the underlying transport
         layer protocols to establish host-to-host connections.
        DHCP, DHCPv6, DNS, FTP, HTTP, IRC, MGCP, BGP ,NTP
         ,POP, RTP, RTSP, RIP, SIP, SMTP, SNMP, SSH, Telnet, SSL
                               (C) Anuradha Udunuwara
FTP
33



        standard network protocol used to transfer files from one host or to
         another host over a TCP-based network, such as the Internet
        FTP is built on a client-server architecture and uses separate control
         and data connections between the client and the server
        FTP users may authenticate themselves using a clear-text sign-in
         protocol, normally in the form of a username and password, but can
         connect anonymously if the server is configured to allow it.
        For secure transmission that hides (encrypts) the username and
         password, and encrypts the content, FTP is often secured with
         SSL/TLS ("FTPS")

                                     (C) Anuradha Udunuwara
LAN, WAN TECHNOLOGIES
Services /Application (wire-line)
                         Voice                                                         Data
             PSTN                                         TDM
Legacy


                                                      
                                                              Services : Leased line

                Access : Copper                           

                                                           
                                                                Access : Copper, fiber
                                                                Transmission : PDH, SDH

                Transmission : PDH, SDH                 Narrowband
                                                               Services : Internet

                Switching : Circuit Switching             

                                                           
                                                                Access : Dialup (PSTN)
                                                                Transmission : PDH, SDH


                                                         IP
            NGN                                               Services : L3 VPN (IP/VPN), L2 VPN (VPLS)
                                                                Access : Copper, fiber
NGN




                                                           

                Access : Copper, fiber                        Transport : IP/MPLS
                                                          Broadband
                 Aggregation : Carrier Ethernet
                                                      
                                                              Services : Internet, IPTV, VoBB

                Core : IP/MPLS                            

                                                           
                                                                Access : Copper, fiber
                                                                Transport : IP/MPLS

                Switching : Packet Switching

                                     (C) Anuradha Udunuwara                                  35
36




     Source : http://www.chtglobal.com/enterprise/integrated-voice-data/
                                        (C) Anuradha Udunuwara
Types of Networks
37




     1.Local Area Network (LAN)

     2.Wide Area Network (WAN)

     3.Metropolitan Area Network (MAN)
                          (C) Anuradha Udunuwara
LAN
38



     •A group of computers and network communication devices interconnected within
     a geographically limited area, such as a building
     • Characterized by,
         • Transfer data at high speeds
         • Exist in a limited geographical area
         • Resources are managed by the company running the LAN



                                       (C) Anuradha Udunuwara
39




     Source: http://www.novagraph.com/examples/lan.html
                                       (C) Anuradha Udunuwara
40




     Source : http://www.pcmag.com/encyclopedia_term/0,2542,t%3Drouter&i%3D50637,00.asp
                                           (C) Anuradha Udunuwara
WAN
41




     •Interconnects LANs
     • Characterized by,
         • Transfer data at low speeds
         • Exist in an unlimited geographical area
         • Interconnects multiple LANs
         • Connectivity and Resources are managed by a Telephone Company


                                         (C) Anuradha Udunuwara
42




     Source : https://learningnetwork.cisco.com/thread/35420
                            (C) Anuradha Udunuwara
WAN IP Routing
43




       Source : http://images.yourdictionary.com/routing-protocol
                                    (C) Anuradha Udunuwara
Routing Cont.,
44




      Source : http://docs.oracle.com/cd/E19082-01/819-3000/gcxjj/index.html
                                    (C) Anuradha Udunuwara
45




     Source: http://www.pcmag.com/encyclopedia_term/0,2542,t%3Drouter&i%3D50637,00.asp
                                        (C) Anuradha Udunuwara
L2 switching vs.                          L3 Routing
46



        Until the destination is             Does not flood the
         found the network is                  network
         flooded
        VLAN reduces
         unnecessary flooding


                                    (C) Anuradha Udunuwara
L2 switching
47



        Media Access Control (MAC) based
        VLAN based




                             (C) Anuradha Udunuwara
L2 switch
48



     • MAC learning table (forwarding table)
       – MAC/VLAN <-> port
     • VLAN table – identification/separation (used
       for tagging/un tagging)
       – VLAN <-> port
       A VLAN is assigned to a port by the switch. This is not
         dynamic. Need to provision.
                              (C) Anuradha Udunuwara
Functions of a L2 Switch
49




        MAC learning (populating the MAC/VLAN table)
        Forwarding (uses MAC/VALN table)

        If a computer does not send traffic (silent), then all
         the traffic coming to that computer come as
         flooding (the switch learns the computers MAC by
         the source MAC)
                              (C) Anuradha Udunuwara
Broadcasting
50




        Ex:- server advertises its presence to the clients
                                                               Single
                   Client                    Client
                                                             broadcast
                                                              domain

                            L2 Switch
                              (flood)




                                        Server (broadcast)
                                 (C) Anuradha Udunuwara
VPN
51




        L1
        L2
        L3
          Over the Internet
          Over SP network



                               (C) Anuradha Udunuwara
MPLS
52



        Traffic is switched
        Control signal is routed
        mechanism in high-performance telecommunications networks that directs data from
         one network node to the next based on short path labels rather than long network
         addresses, avoiding complex lookups in a routing table
        labels identify virtual links (paths) between distant nodes rather than endpoints
        can encapsulate packets of various network protocols
        supports a range of access technologies, including T1/E1, ATM, Frame Relay & DSL


                                            (C) Anuradha Udunuwara
53




     Source: http://blog.ipexpert.com/2012/06/06/introduction-to-mpls/
                                     (C) Anuradha Udunuwara
Ethernet frame: Get me to the other side
54

                                            RSVP-TE signaling
                                       B                                       D

                   A             LDP signaling session (TCP port 646)
                                                                                                   E

                                                           C
        Ethernet                                                                                       Ethernet


                                                       MPLS


                       Outer label 1       Outer label 2       Outer label 3       Outer label 4
                       Inner label         Inner label         Inner label         Inner label
       Ethernet         Ethernet            Ethernet            Ethernet            Ethernet               Ethernet

                                                     (C) Anuradha Udunuwara
The world of headers
55




                   (C) Anuradha Udunuwara
ACCESS TECHNOLOGIES
Network Architecture




                                                 NTU
                                                          CPE
                                                 Router
57                      (C) Anuradha Udunuwara   Switch   Router
                                                          Switch
Segments of NGN Architecture
58




                                                                                                  VoIP
                                                                     IMS Controllers
                                                                  Control and Signaling             Video
                              CDMA                                Network                  Application
      Customer    FTTx                                  Core         Non-IMS Controllers
      Equipment             Access                      Network                                     Data
                            Network    Aggregation
                  xDSL                 Network                                              IM

                               Wimax




     User                Access        Aggregation     Core                 Control and    Application
     Equipments          Network       Network         Network              Signaling      Network
                                                                            Network




                                         (C) Anuradha Udunuwara
Access Network
59




      Edge of the network
      Enable delivery of services for specific markets

      Enable the connection of telecommunication

       services with subscribers


                          (C) Anuradha Udunuwara
Typical Cu access network last (first) mile
                                                     OSP

                                 DP                                        CO

                    (overhead)                                                   Edge
          CP                                                                     Network
                                                                     MDF
                                                                                 Node
Rosette                                                 CAB
                                                         Primary           Ex:- C4/5 switch,
                                         Secondary
                  Discharger                                                AGW
                                       (Underground) (Underground)

Network demarcation
Ex:- Telephone,
DSU, modem, NTU
                                      (C) Anuradha Udunuwara                           60
Data support via voice-grade modems
61




     •   To send data, it is converted into 4 kHz audio (modem)
     •   Data rate is determined by Shannon's capacity theorem (there is a maximum data rate (bps)
         called the "capacity”, that can be reliably sent through the communications channel. The
         capacity depends on the BW and SNR) (C) Anuradha Udunuwara
62




     Source: http://www.cse.wustl.edu/~jain/cse473-05/ftp/i_3phy/sld025.htm
                                         (C) Anuradha Udunuwara
Digital Local Loop Technologies
63



        ISDN
          Voice and Data
          Longer distance
        DSL
          Higher speed
          Several variants
        Different encoding technologies -> different data
         transmission rates
                               (C) Anuradha Udunuwara
ISDN
64



        a set of communication standards for simultaneous digital
         transmission of voice, video, data, and other network services over
         the traditional circuits of the PSTN
        There are several kinds of access interfaces to ISDN defined as
         Basic Rate Interface (BRI), Primary Rate Interface (PRI) and
         Broadband ISDN (B-ISDN).
        ISDN is a circuit-switched telephone network system, which also
         provides access to packet switched networks, designed to allow
         digital transmission of voice and data over ordinary telephone
         copper wires

                                     (C) Anuradha Udunuwara
ISDN, cont.,
65




      Source: http://www.cisco.com/en/US/docs/ios/dial/configuration/guide/dia_isdn_pri_slt_ps6350_TSD_Products_Configuration_Guide_Chapter.html
                                                             (C) Anuradha Udunuwara
DSL technologies
           ADSL          ANSI T1.413 Issue 2
66                       ITU G.992.1 (G.DMT)
                         ITU G.992.2 (G.Lite)

           ADSL2         ITU G.992.3
                         ITU G.992.4
                         ITU G.992.3 Annex J
                         ITU G.992.3 Annex L

           ADSL2+        ITU G.992.5
                         ITU G.992.5 Annex M

           HDSL          ITU G.991.1
           HDSL2
           IDSL
           MSDSL
           PDSL
           RADSL
           SDSL

           SHDSL         ITU G.991.2
           UDSL
           VDSL          ITU G.993.1
           VDSL2         ITU G.993.2

                    (C) Anuradha Udunuwara
G.SHDSL
67


        Single-pair High-speed Digital Subscriber Line
        faster data transmission over copper lines
        employs
            TC-PAM (Trellis Coded Pulse Amplitude Modulation) modulation
            frequencies that include those used by POTS
        provide equal transmit and receive (i.e. symmetric) data rates
        reach varies according to the loop rate and noise conditions
        SHDSL payload may be either
            T1 or E1 (full rate or fractional),
            multiple ISDN Basic Rate Interface (BRI),
            ATM cells or
            Ethernet frames                     (C) Anuradha Udunuwara
Factors driving the interest in G.SHDSL
68



        Standardization
        Improved data rate
            offers a two-wire standard operating at 2.3M bit/sec and
             four-wire standard operating at 4.6M bit/sec
        Improved reach
        Spectral compatibility
            spectrally compatible with ADSL, causing little noise or
             crosstalk between cables

                                    (C) Anuradha Udunuwara
G.SHDSL.bis
69



        G.SHDSL first published in February 2001
        Major updates to G.991.2 were released in December 2003.
         Equipment conforming to the 2003 version of G.991.2 is often
         referred to by the standard's draft name of G.SHDSL.bis or just
         SHDSL.bis.
        Updated G.991.2 features:
            Optional support for up to four copper pair connections
            Optional extensions to allow user data rates up to 5696 kbit/s
            Optional support for dynamic rate repartitioning, allowing flexible change of the
             SHDSL data rate without service interruption
            New payload definitions including Ethernet packet transfer mode (PTM)
                                             (C) Anuradha Udunuwara
xDSL flavors
70




     Source : http://wiki.ftthcouncil.eu/index.php?title=File:Dsl-distance-chart.png&filetimestamp=20100413150655
                                                         (C) Anuradha Udunuwara
Next Generation Access Options
71




                                       Next
          TDM     NGN                Generation
           POTS    ADSL
           V5.2   ADSL2+              Access
                   VDSL                  FTTx, ETH
                                        WiMAX, LTE
                                          VDSL2



                    (C) Anuradha Udunuwara
Access network Migration (example)

         Current        Short Term                            Long Term
     AGW, C5 switch      AGW (Cu)
                                                FTTx
      Data Network      AGW (Cu)
      Metro Ethernet   Metro Ethernet       Metro Ethernet

         CDMA             CDMA
      2G/3G/3.5G       2G/3G/3.5G             LTE
         WiMAX            WiMAX




72                                   (C) Anuradha Udunuwara
FTTx Technologies
73




                   (C) Anuradha Udunuwara
CSP broadband equation
74




        Urban        Sub-urban                  Rural




          Wired                                 Wireless
                      wired/wireless
         Ex:- FTTH                              Ex:- LTE

                       (C) Anuradha Udunuwara
INTERNET APPLICATIONS
Electronic mailing
76



        commonly referred to as email or e-mail
        a method of exchanging digital messages from an author to one or
         more recipients.
        Modern email operates across the Internet or other computer
         networks
        Some early email systems required that the author and the recipient
         both be online at the same time, in common with instant messaging
        Today's email systems are based on a store-and-forward model.
        Email servers accept, forward, deliver and store messages

                                    (C) Anuradha Udunuwara
77




     Source: http://en.flossmanuals.net/thunderbird/how-email-works/
                                     (C) Anuradha Udunuwara
78




     Source: http://www.linuxmail.info/how-email-works/
                                        (C) Anuradha Udunuwara
79




     Source: http://en.flossmanuals.net/thunderbird/how-email-works/
                                      (C) Anuradha Udunuwara
80


     SMTP
     Simple Mail Transport Protocol - These rules handle outgoing email and get your email from your
     computer to your friend's service provider.

     POP3
     Post Office Protocol - These are the rules governing incoming email. It allows you to keep a set of
     messages on a server that mail client can access and download to your computer. Once the email
     is downloaded to your computer, it is usually deleted from the server.

     IMAP
     Internet Mail Access Protocol - This is a different set of rules governing incoming email. IMAP is
     more sophisticated than POP3. It allows you to keep messages on a server that you can access
     from multiple computers. With IMAP, you can use your mail client to access an email account from
     home and Outlook to do this from work and still keep all your messages on the server.


                                                (C) Anuradha Udunuwara
Web on Internet
81




        WWW
        DNS
        HTTP
        HTTPS
        HTML

                   (C) Anuradha Udunuwara
intranets
82



        a computer network that uses IP technology to share information,
         operational systems, or computing services within an organization
        Sometimes, refers only to the organization's internal website, but
         may be a more extensive part of the organization's information
         technology infrastructure
        may be composed of multiple LANs
        objective is to organize each individual's desktop with minimal cost,
         time and effort to be more productive, cost efficient, timely, and
         competitive


                                     (C) Anuradha Udunuwara
internet
83




        a network between organizations
        Internet vs. internet




                            (C) Anuradha Udunuwara
extranet
84



        a computer network that allows controlled access from the outside,
         for specific business or educational purposes
        In a business-to-business context, an extranet can be viewed as an
         extension of an organization's intranet that is extended to users
         outside the organization, usually partners, vendors, and suppliers, in
         isolation from all other Internet users
        An extranet is similar to a DMZ in that it provides access to needed
         services for channel partners, without granting access to an
         organization's entire network


                                     (C) Anuradha Udunuwara
85




     Source: http://www.brighthub.com/computing/enterprise-security/articles/63387.aspx
                                         (C) Anuradha Udunuwara
86




     Source: http://www.marketing-online.co.uk/book/ch01im01.html
                                  (C) Anuradha Udunuwara
E-commerce
87



        type of industry where buying and selling of product or service is
         conducted over electronic systems such as the Internet and other
         computer networks
        E-commerce draws on such technologies as mobile commerce,
         electronic funds transfer, supply chain management, Internet
         marketing, online transaction processing, inventory management
         systems & automated data collection systems
        Modern e-commerce typically uses the WWW at least at one point
         in the transaction's life-cycle, although it may encompass a wider
         range of technologies such as e-mail, mobile devices social media,
         and telephones as well
                                    (C) Anuradha Udunuwara
About the Author
88


     Eng. Anuradha Udunuwara is a Chartered Engineer by profession based in Sri Lanka. He has nearly a decade
     industry experience in strategy, architecture, engineering, design, plan, implementation and maintenance of CSP
     Networks using both packet-switched (PS) and Circuit-Switched (CS) technologies, along with legacy to NGN
     migration. Eng. Anuradha is a well-known in the field of CSP industry, both locally and internationally.
     Graduated from University of Peradeniya, Sri Lanka in 2001 with an honors in Electrical & Electronic Engineering,
     Eng. Anuradha is a corporate member of the Institution of Engineers Sri Lanka, a professional member of British
     Computer Society, a member of Institution of Electrical & Electronic Engineers, a member of Institution of
     Engineering & Technology (formerly Institution of Electrical Engineers), a member of the Computer Society of Sri
     Lanka, a life member of Sri Lanka Association for the Advancement of Science, senior member of the Carrier
     Ethernet Forum, member of the Internet Society, member of the Internet Strategy Forum, member of the Internet
     Strategy Forum Network, member of the Ethernet Academy, member of the NGN/IMS forum and member of the
     Peradeniya Engineering Faculty Alumni Association. He is also an ITIL foundation certified and the only MEF-CECP in
     the country.
     In his spare time Anuradha enjoys spending time with his family, playing badminton, photography, reading and
     travelling.
     He can be reached at udunuwara@ieee.org

                                                      (C) Anuradha Udunuwara

Contenu connexe

Tendances

Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingAnjan Mahanta
 
dimensions of information system
dimensions of information systemdimensions of information system
dimensions of information systemAZEEM M
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1Abenezer Abiti
 
Monitoring and Supporting Data Conversion.pdf
Monitoring and Supporting  Data Conversion.pdfMonitoring and Supporting  Data Conversion.pdf
Monitoring and Supporting Data Conversion.pdfseifusisay06
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and networkNirajan Silwal
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemJayson Jueco
 
Data resource management
Data resource managementData resource management
Data resource managementNirajan Silwal
 
Management information system question and answers
Management information system question and answersManagement information system question and answers
Management information system question and answerspradeep acharya
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkAnzaDar3
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design Matthew McKenzie
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 

Tendances (20)

Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
dimensions of information system
dimensions of information systemdimensions of information system
dimensions of information system
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
e-Business systems - introduction it knowledge week 7
e-Business systems - introduction	 it knowledge week 7e-Business systems - introduction	 it knowledge week 7
e-Business systems - introduction it knowledge week 7
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 
Monitoring and Supporting Data Conversion.pdf
Monitoring and Supporting  Data Conversion.pdfMonitoring and Supporting  Data Conversion.pdf
Monitoring and Supporting Data Conversion.pdf
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and network
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
System design
System designSystem design
System design
 
Data resource management
Data resource managementData resource management
Data resource management
 
Management information system question and answers
Management information system question and answersManagement information system question and answers
Management information system question and answers
 
System Unit
System UnitSystem Unit
System Unit
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless network
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 

En vedette

Cultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the InternetCultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the Internetinscit2006
 
Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)Kamil Kopecky
 
Internet communication
Internet communicationInternet communication
Internet communicationKarwan Jacksi
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Internet Communication
Internet CommunicationInternet Communication
Internet CommunicationShivscape
 
Military Involvement
Military InvolvementMilitary Involvement
Military InvolvementShivscape
 
The Internet (The Problem With...)
The Internet (The Problem With...)The Internet (The Problem With...)
The Internet (The Problem With...)Helior Colorado
 
E Communication and the Internet - Threat Or Possibility for postal services
E Communication and the Internet - Threat Or Possibility for postal servicesE Communication and the Internet - Threat Or Possibility for postal services
E Communication and the Internet - Threat Or Possibility for postal servicespauldon
 
M commerce and its applications
M commerce and its applicationsM commerce and its applications
M commerce and its applicationsAlok Gupta
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and interneteVidhya
 
The Rise of M-Commerce
The Rise of M-CommerceThe Rise of M-Commerce
The Rise of M-Commercesantosh singh
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisalbernardsanch
 
Tutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the InternetTutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the Internetdpd
 
Importance of Mobile Applications
Importance of Mobile ApplicationsImportance of Mobile Applications
Importance of Mobile ApplicationsFutuready Media
 
мэдээллийн системийн үндэс
мэдээллийн системийн үндэсмэдээллийн системийн үндэс
мэдээллийн системийн үндэсTsetsenkhuu Otgonbayar
 
Challenges and issues of mCommerce - ecommerce solution provider
Challenges and issues of mCommerce - ecommerce solution providerChallenges and issues of mCommerce - ecommerce solution provider
Challenges and issues of mCommerce - ecommerce solution providerVineela Kanapala
 
Graphic rating scale performance appraisal
Graphic rating scale performance appraisalGraphic rating scale performance appraisal
Graphic rating scale performance appraisalkeshiaflores440
 

En vedette (20)

Cultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the InternetCultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the Internet
 
Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)
 
Internet communication
Internet communicationInternet communication
Internet communication
 
It101 lec1
It101 lec1It101 lec1
It101 lec1
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Internet Communication
Internet CommunicationInternet Communication
Internet Communication
 
Military Involvement
Military InvolvementMilitary Involvement
Military Involvement
 
The Internet (The Problem With...)
The Internet (The Problem With...)The Internet (The Problem With...)
The Internet (The Problem With...)
 
E Communication and the Internet - Threat Or Possibility for postal services
E Communication and the Internet - Threat Or Possibility for postal servicesE Communication and the Internet - Threat Or Possibility for postal services
E Communication and the Internet - Threat Or Possibility for postal services
 
M commerce and its applications
M commerce and its applicationsM commerce and its applications
M commerce and its applications
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Uk Mobile Commerce Report
Uk Mobile Commerce ReportUk Mobile Commerce Report
Uk Mobile Commerce Report
 
The Rise of M-Commerce
The Rise of M-CommerceThe Rise of M-Commerce
The Rise of M-Commerce
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
 
Top 10 internet uses
Top 10 internet usesTop 10 internet uses
Top 10 internet uses
 
Tutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the InternetTutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the Internet
 
Importance of Mobile Applications
Importance of Mobile ApplicationsImportance of Mobile Applications
Importance of Mobile Applications
 
мэдээллийн системийн үндэс
мэдээллийн системийн үндэсмэдээллийн системийн үндэс
мэдээллийн системийн үндэс
 
Challenges and issues of mCommerce - ecommerce solution provider
Challenges and issues of mCommerce - ecommerce solution providerChallenges and issues of mCommerce - ecommerce solution provider
Challenges and issues of mCommerce - ecommerce solution provider
 
Graphic rating scale performance appraisal
Graphic rating scale performance appraisalGraphic rating scale performance appraisal
Graphic rating scale performance appraisal
 

Similaire à Data Communication and Internet

FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical NetworksAnuradha Udunuwara
 
Communications Service Provider Networks
Communications Service Provider NetworksCommunications Service Provider Networks
Communications Service Provider NetworksAnuradha Udunuwara
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
computer networks
computer networks computer networks
computer networks AKSHIT KOHLI
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018俊廷 陳
 
2002023
20020232002023
2002023pglehn
 
Future of wire line access networks
Future of wire line access networksFuture of wire line access networks
Future of wire line access networksAnuradha Udunuwara
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networksadil raja
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 

Similaire à Data Communication and Internet (20)

Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
FTTH Basics
FTTH BasicsFTTH Basics
FTTH Basics
 
FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical Networks
 
Communications Service Provider Networks
Communications Service Provider NetworksCommunications Service Provider Networks
Communications Service Provider Networks
 
Metro Ethernet Concepts
Metro Ethernet ConceptsMetro Ethernet Concepts
Metro Ethernet Concepts
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
BACKBONE NETWORKS
BACKBONE NETWORKSBACKBONE NETWORKS
BACKBONE NETWORKS
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
computer networks
computer networks computer networks
computer networks
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018
 
2002023
20020232002023
2002023
 
Ijcnc050211
Ijcnc050211Ijcnc050211
Ijcnc050211
 
Future of wire line access networks
Future of wire line access networksFuture of wire line access networks
Future of wire line access networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Frame
FrameFrame
Frame
 

Plus de Anuradha Udunuwara

Plus de Anuradha Udunuwara (15)

7998 - Broadband Technologies and Multimedia Services Final
7998 - Broadband Technologies and Multimedia Services Final7998 - Broadband Technologies and Multimedia Services Final
7998 - Broadband Technologies and Multimedia Services Final
 
8000 - Fibre Optic Access Network
8000 - Fibre Optic Access Network8000 - Fibre Optic Access Network
8000 - Fibre Optic Access Network
 
Carrier Ethernet - What and Why
Carrier Ethernet - What and Why  Carrier Ethernet - What and Why
Carrier Ethernet - What and Why
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to Optical Backbone Networks
Introduction to Optical Backbone NetworksIntroduction to Optical Backbone Networks
Introduction to Optical Backbone Networks
 
CSP IP Networks
CSP IP NetworksCSP IP Networks
CSP IP Networks
 
WDM principles
WDM principlesWDM principles
WDM principles
 
12 tips on changing the game
12 tips on changing the game12 tips on changing the game
12 tips on changing the game
 
CSP related Standards and SDOs
CSP related Standards and SDOsCSP related Standards and SDOs
CSP related Standards and SDOs
 
CSP industry overview
CSP industry overviewCSP industry overview
CSP industry overview
 
Broadband.Doing it right.
Broadband.Doing it right.Broadband.Doing it right.
Broadband.Doing it right.
 
Next Generation OTN
Next Generation OTNNext Generation OTN
Next Generation OTN
 
Why EoMPLS for CE
Why EoMPLS for CEWhy EoMPLS for CE
Why EoMPLS for CE
 
PBB-TE
PBB-TEPBB-TE
PBB-TE
 
Optical Transport Network
Optical Transport NetworkOptical Transport Network
Optical Transport Network
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Data Communication and Internet

  • 1. DATA COMMUNICATION & INTERNET FEBRUARY 2013 By Eng. Anuradha Udunuwara, BSc.Eng(Hons), CEng, MIE(SL), MEF-CECP, MBCS, ITILv3 Foundation, MIEEE, MIEEE-CS, MIEE, MIET, MCS(SL), MSLAAS
  • 2. Agenda 2 Introduction Access Technologies OSI Model and Protocols a. Analog Dial Access b. ISDN Access a. Data Link Protocols – FR, ATM, PPP c. Broadband Access b. Network Protocols - IP d. ADSL Technology c. Transport Protocols – TCP e. Data circuits d. Application Protocols - SMTP, FTP f. VPN LAN WAN Technologies Internet Applications a. LAN Networking a. Electronic mailing b. WAN IP Routing b. Web on Internet c. WAN Switching c. Intranets d. LAN Bridging d. Extranets f. VPN Technology e. E-commerce g. MPLS (C) Anuradha Udunuwara
  • 4. Why a network? 4 CSP Network Subscriber/ services customer/ user Customers don’t buy networks (C) Anuradha Udunuwara
  • 5. The network lifecycle 5 Strategy & Planning & Projects & Operations & Architecture Designing Implementation Maintenance (C) Anuradha Udunuwara
  • 7. King of England  King of France Scriber Scriber Translator Translator Negotiator Negotiator Manager Manager Mail room Mail room Envelop Envelop Delivery Delivery (C) Anuradha Udunuwara 7
  • 8. Please Do Not Throw Sausage Pizza Away User A 8 User B Layer 7 Application Application Presentation Presentation Session Session Transport Transport Network Network Data Link Data Link Layer 1 Physical Physical (C) Anuradha Udunuwara
  • 9. OSI model 9  prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers (a way of hiding the implementation details of a particular set of functionality)  Similar communication functions are grouped into logical layers  A layer serves the layer above it and is served by the layer below it (C) Anuradha Udunuwara
  • 10. TCP/IP vs. OSI 10 Source: http://webpage.pace.edu/ms16182p/networking/protocols.html (C) Anuradha Udunuwara
  • 11. 11 Source : http://ccna-cisco.webs.com/osilayer.htm (C) Anuradha Udunuwara
  • 12. 12 Source : http://www.telecomhall.com/osi-7-layers-model.aspx (C) Anuradha Udunuwara
  • 13. 13 Source: http://webpage.pace.edu/ms16182p/networking/protocols.html (C) Anuradha Udunuwara
  • 14. 14 Source : http://www.markwilson.co.uk/blog/2006/03/osi-reference-model-and-how-it-relates.htm (C) Anuradha Udunuwara
  • 15. Core Network Evolution 15  Synchronous  Connection oriented  TDM  SDH  PDH  Asynchronous  Connection oriented  X.25 (1976)  FR(80s)  ATM (90s)  MPLS  Connection-less  Ethernet (1973~1976)  IP (DoD Standard IP, RFC 760, Jan 1980) (C) Anuradha Udunuwara
  • 16. Data Link Layer 16  protocol layer that transfers data between adjacent network nodes in a WAN or between nodes on the same LAN segment  provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer  Ex: - ATM, L2TP, IEEE 802.3, Frame Relay, PPP, X.25 (C) Anuradha Udunuwara
  • 17. ATM 17  a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals, and is designed to unify telecommunication and computer networks  uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells  differs from approaches such as the IP or Ethernet that use variable sized packets or frames  provides data link layer services that run over a wide range of OSI physical Layer links  has functional similarity with both circuit switched networking and small packet switched networking  designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers), and real-time, low-latency content such as voice and video  uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the actual data exchange begins  is a core protocol used over the SONET/SDH backbone of the PSTN and ISDN, but its use is declining in favor of all IP (C) Anuradha Udunuwara
  • 18. 18 Source: http://support.novell.com/techcenter/articles/nc1997_02c.html (C) Anuradha Udunuwara
  • 19. ATM, cont., 19 Source: http://jonapchan.blogspot.com/2012/02/asynchronous-transfer-mode-atm.html (C) Anuradha Udunuwara
  • 20. FR 20  standardized WAN technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology  Originally designed for transport across ISDN infrastructure, it may be used today in the context of many other network interfaces  Network providers commonly implement Frame Relay for voice (VoFR) and data as an encapsulation technique, used between LANs over a WAN  Each end-user gets a private line (or leased line) to a FR node  FR network handles the transmission over a frequently-changing path transparent to all end-user extensively-used WAN protocols  less expensive than leased lines and that is one reason for its popularity  extreme simplicity of configuring user equipment in a FR network offers another reason for FR’s popularity  With the advent of Ethernet over fiber optics, MPLS, VPN and dedicated broadband services such as cable modem and DSL, the end may loom for the Frame Relay protocol and encapsulation  many rural areas remain lacking DSL and cable modem services. In such cases the least expensive type of non-dial-up connection remains a 64-kbit/s frame-relay line (C) Anuradha Udunuwara
  • 21. FR, cont., 21 Source: http://en.wikipedia.org/wiki/Frame_Relay (C) Anuradha Udunuwara
  • 22. FR, cont., 22 Source: http://feryjunaedi.wordpress.com/page/3/ (C) Anuradha Udunuwara
  • 23. PPP 23  a data link protocol commonly used in establishing a direct connection between two networking nodes  used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET  also used over Internet access connections (now marketed as "broadband")  ISPs have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol  Two encapsulated forms of PPP, PPPoE and PPPoA, are used most commonly by Internet Service Providers (ISPs) to establish a DSL Internet service connection with customers (C) Anuradha Udunuwara
  • 24. Network Layer 24  responsible for packet forwarding including routing through intermediate routers  provides the functional and procedural means of transferring variable length data sequences from a source to a destination host via one or more networks while maintaining the quality of service functions  Functions of the network layer include:  Connection model: connectionless communication  Example:- IP is connectionless, in that a datagram can travel from a sender to a recipient without the recipient having to send an acknowledgement  Every host in the network must have a unique address that determines where it is. This address is normally assigned from a hierarchical system, so you can be "Fred Murphy" to people in your house, "Fred Murphy, 1 Main Street" to Dubliners, or "Fred Murphy, 1 Main Street, Dublin" to people in Ireland, or "Fred Murphy, 1 Main Street, Dublin, Ireland" to people anywhere in the world. On the Internet, addresses are known as IP addresses  Since many networks are partitioned into subnetworks and connect to other networks for wide-area communications, networks use specialized hosts, called gateways or routers to forward packets between networks  Ex: -IPv4, IPv6, ARP, ICMP, IPSec, IGMP, IPX, AppleTalk (C) Anuradha Udunuwara
  • 25. IP 25  IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering packets from the source host to the destination host solely based on the addresses.  For this purpose, IP defines datagram structures that encapsulate the data to be delivered  also defines addressing methods that are used to label the datagram source and destination  connectionless  The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the internet  successor is Internet Protocol Version 6 (IPv6), which is increasing in use. (C) Anuradha Udunuwara
  • 26. 26 Source: http://www.hill2dot0.com/wiki/index.php?title=IP_address (C) Anuradha Udunuwara
  • 27. X.25 27  an ITU-T standard protocol suite for packet switched WAN communication  X.25 WAN consists of packet-switching exchange (PSE) nodes as the networking hardware, and leased lines, plain old telephone service connections or ISDN connections as physical links  replaced by less complex protocols, especially the IP (C) Anuradha Udunuwara
  • 28. X.25, cont., 28 Source: http://sangoma.com/support/tutorials/x25.html (C) Anuradha Udunuwara
  • 29. X.25, cont., 29 Source: http://www.cisco.com/en/US/docs/ios-xml/ios/wan_smxl/configuration/12-4t/wan-cfg-x25-lapb.html (C) Anuradha Udunuwara
  • 30. Transport Layer 30  provides end-to-end communication services for applications within a layered architecture of network components and protocols  provides convenient services such as connection- oriented data stream support, reliability, flow control, and multiplexing  Ex:-TCP UDP (C) Anuradha Udunuwara
  • 31. TCP 31  one of the two original components of the suite, complementing the IP, and therefore the entire suite is commonly referred to as TCP/IP  provides reliable, ordered delivery of a stream of octets from a program on one computer to another program on another computer  used by major Internet applications such as the WWW, email, remote administration and file transfer  Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability (C) Anuradha Udunuwara
  • 32. Application Layer 32  an abstraction layer reserved for communications protocols and methods designed for process-to-process communications across a IP computer network.  Application layer protocols use the underlying transport layer protocols to establish host-to-host connections.  DHCP, DHCPv6, DNS, FTP, HTTP, IRC, MGCP, BGP ,NTP ,POP, RTP, RTSP, RIP, SIP, SMTP, SNMP, SSH, Telnet, SSL (C) Anuradha Udunuwara
  • 33. FTP 33  standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet  FTP is built on a client-server architecture and uses separate control and data connections between the client and the server  FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it.  For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS") (C) Anuradha Udunuwara
  • 35. Services /Application (wire-line)  Voice  Data PSTN TDM Legacy    Services : Leased line  Access : Copper   Access : Copper, fiber Transmission : PDH, SDH  Transmission : PDH, SDH  Narrowband  Services : Internet  Switching : Circuit Switching   Access : Dialup (PSTN) Transmission : PDH, SDH  IP  NGN  Services : L3 VPN (IP/VPN), L2 VPN (VPLS) Access : Copper, fiber NGN   Access : Copper, fiber  Transport : IP/MPLS Broadband Aggregation : Carrier Ethernet    Services : Internet, IPTV, VoBB  Core : IP/MPLS   Access : Copper, fiber Transport : IP/MPLS  Switching : Packet Switching (C) Anuradha Udunuwara 35
  • 36. 36 Source : http://www.chtglobal.com/enterprise/integrated-voice-data/ (C) Anuradha Udunuwara
  • 37. Types of Networks 37 1.Local Area Network (LAN) 2.Wide Area Network (WAN) 3.Metropolitan Area Network (MAN) (C) Anuradha Udunuwara
  • 38. LAN 38 •A group of computers and network communication devices interconnected within a geographically limited area, such as a building • Characterized by, • Transfer data at high speeds • Exist in a limited geographical area • Resources are managed by the company running the LAN (C) Anuradha Udunuwara
  • 39. 39 Source: http://www.novagraph.com/examples/lan.html (C) Anuradha Udunuwara
  • 40. 40 Source : http://www.pcmag.com/encyclopedia_term/0,2542,t%3Drouter&i%3D50637,00.asp (C) Anuradha Udunuwara
  • 41. WAN 41 •Interconnects LANs • Characterized by, • Transfer data at low speeds • Exist in an unlimited geographical area • Interconnects multiple LANs • Connectivity and Resources are managed by a Telephone Company (C) Anuradha Udunuwara
  • 42. 42 Source : https://learningnetwork.cisco.com/thread/35420 (C) Anuradha Udunuwara
  • 43. WAN IP Routing 43 Source : http://images.yourdictionary.com/routing-protocol (C) Anuradha Udunuwara
  • 44. Routing Cont., 44 Source : http://docs.oracle.com/cd/E19082-01/819-3000/gcxjj/index.html (C) Anuradha Udunuwara
  • 45. 45 Source: http://www.pcmag.com/encyclopedia_term/0,2542,t%3Drouter&i%3D50637,00.asp (C) Anuradha Udunuwara
  • 46. L2 switching vs. L3 Routing 46  Until the destination is  Does not flood the found the network is network flooded  VLAN reduces unnecessary flooding (C) Anuradha Udunuwara
  • 47. L2 switching 47  Media Access Control (MAC) based  VLAN based (C) Anuradha Udunuwara
  • 48. L2 switch 48 • MAC learning table (forwarding table) – MAC/VLAN <-> port • VLAN table – identification/separation (used for tagging/un tagging) – VLAN <-> port A VLAN is assigned to a port by the switch. This is not dynamic. Need to provision. (C) Anuradha Udunuwara
  • 49. Functions of a L2 Switch 49  MAC learning (populating the MAC/VLAN table)  Forwarding (uses MAC/VALN table)  If a computer does not send traffic (silent), then all the traffic coming to that computer come as flooding (the switch learns the computers MAC by the source MAC) (C) Anuradha Udunuwara
  • 50. Broadcasting 50  Ex:- server advertises its presence to the clients Single Client Client broadcast domain L2 Switch (flood) Server (broadcast) (C) Anuradha Udunuwara
  • 51. VPN 51  L1  L2  L3  Over the Internet  Over SP network (C) Anuradha Udunuwara
  • 52. MPLS 52  Traffic is switched  Control signal is routed  mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table  labels identify virtual links (paths) between distant nodes rather than endpoints  can encapsulate packets of various network protocols  supports a range of access technologies, including T1/E1, ATM, Frame Relay & DSL (C) Anuradha Udunuwara
  • 53. 53 Source: http://blog.ipexpert.com/2012/06/06/introduction-to-mpls/ (C) Anuradha Udunuwara
  • 54. Ethernet frame: Get me to the other side 54 RSVP-TE signaling B D A LDP signaling session (TCP port 646) E C Ethernet Ethernet MPLS Outer label 1 Outer label 2 Outer label 3 Outer label 4 Inner label Inner label Inner label Inner label Ethernet Ethernet Ethernet Ethernet Ethernet Ethernet (C) Anuradha Udunuwara
  • 55. The world of headers 55 (C) Anuradha Udunuwara
  • 57. Network Architecture NTU CPE Router 57 (C) Anuradha Udunuwara Switch Router Switch
  • 58. Segments of NGN Architecture 58 VoIP IMS Controllers Control and Signaling Video CDMA Network Application Customer FTTx Core Non-IMS Controllers Equipment Access Network Data Network Aggregation xDSL Network IM Wimax User Access Aggregation Core Control and Application Equipments Network Network Network Signaling Network Network (C) Anuradha Udunuwara
  • 59. Access Network 59  Edge of the network  Enable delivery of services for specific markets  Enable the connection of telecommunication services with subscribers (C) Anuradha Udunuwara
  • 60. Typical Cu access network last (first) mile OSP DP CO (overhead) Edge CP Network MDF Node Rosette CAB Primary Ex:- C4/5 switch, Secondary Discharger AGW (Underground) (Underground) Network demarcation Ex:- Telephone, DSU, modem, NTU (C) Anuradha Udunuwara 60
  • 61. Data support via voice-grade modems 61 • To send data, it is converted into 4 kHz audio (modem) • Data rate is determined by Shannon's capacity theorem (there is a maximum data rate (bps) called the "capacity”, that can be reliably sent through the communications channel. The capacity depends on the BW and SNR) (C) Anuradha Udunuwara
  • 62. 62 Source: http://www.cse.wustl.edu/~jain/cse473-05/ftp/i_3phy/sld025.htm (C) Anuradha Udunuwara
  • 63. Digital Local Loop Technologies 63  ISDN  Voice and Data  Longer distance  DSL  Higher speed  Several variants  Different encoding technologies -> different data transmission rates (C) Anuradha Udunuwara
  • 64. ISDN 64  a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the PSTN  There are several kinds of access interfaces to ISDN defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI) and Broadband ISDN (B-ISDN).  ISDN is a circuit-switched telephone network system, which also provides access to packet switched networks, designed to allow digital transmission of voice and data over ordinary telephone copper wires (C) Anuradha Udunuwara
  • 65. ISDN, cont., 65 Source: http://www.cisco.com/en/US/docs/ios/dial/configuration/guide/dia_isdn_pri_slt_ps6350_TSD_Products_Configuration_Guide_Chapter.html (C) Anuradha Udunuwara
  • 66. DSL technologies ADSL ANSI T1.413 Issue 2 66 ITU G.992.1 (G.DMT) ITU G.992.2 (G.Lite) ADSL2 ITU G.992.3 ITU G.992.4 ITU G.992.3 Annex J ITU G.992.3 Annex L ADSL2+ ITU G.992.5 ITU G.992.5 Annex M HDSL ITU G.991.1 HDSL2 IDSL MSDSL PDSL RADSL SDSL SHDSL ITU G.991.2 UDSL VDSL ITU G.993.1 VDSL2 ITU G.993.2 (C) Anuradha Udunuwara
  • 67. G.SHDSL 67  Single-pair High-speed Digital Subscriber Line  faster data transmission over copper lines  employs  TC-PAM (Trellis Coded Pulse Amplitude Modulation) modulation  frequencies that include those used by POTS  provide equal transmit and receive (i.e. symmetric) data rates  reach varies according to the loop rate and noise conditions  SHDSL payload may be either  T1 or E1 (full rate or fractional),  multiple ISDN Basic Rate Interface (BRI),  ATM cells or  Ethernet frames (C) Anuradha Udunuwara
  • 68. Factors driving the interest in G.SHDSL 68  Standardization  Improved data rate  offers a two-wire standard operating at 2.3M bit/sec and four-wire standard operating at 4.6M bit/sec  Improved reach  Spectral compatibility  spectrally compatible with ADSL, causing little noise or crosstalk between cables (C) Anuradha Udunuwara
  • 69. G.SHDSL.bis 69  G.SHDSL first published in February 2001  Major updates to G.991.2 were released in December 2003. Equipment conforming to the 2003 version of G.991.2 is often referred to by the standard's draft name of G.SHDSL.bis or just SHDSL.bis.  Updated G.991.2 features:  Optional support for up to four copper pair connections  Optional extensions to allow user data rates up to 5696 kbit/s  Optional support for dynamic rate repartitioning, allowing flexible change of the SHDSL data rate without service interruption  New payload definitions including Ethernet packet transfer mode (PTM) (C) Anuradha Udunuwara
  • 70. xDSL flavors 70 Source : http://wiki.ftthcouncil.eu/index.php?title=File:Dsl-distance-chart.png&filetimestamp=20100413150655 (C) Anuradha Udunuwara
  • 71. Next Generation Access Options 71 Next TDM NGN Generation POTS ADSL V5.2 ADSL2+ Access VDSL FTTx, ETH WiMAX, LTE VDSL2 (C) Anuradha Udunuwara
  • 72. Access network Migration (example) Current Short Term Long Term AGW, C5 switch AGW (Cu) FTTx Data Network AGW (Cu) Metro Ethernet Metro Ethernet Metro Ethernet CDMA CDMA 2G/3G/3.5G 2G/3G/3.5G LTE WiMAX WiMAX 72 (C) Anuradha Udunuwara
  • 73. FTTx Technologies 73 (C) Anuradha Udunuwara
  • 74. CSP broadband equation 74 Urban Sub-urban Rural Wired Wireless wired/wireless Ex:- FTTH Ex:- LTE (C) Anuradha Udunuwara
  • 76. Electronic mailing 76  commonly referred to as email or e-mail  a method of exchanging digital messages from an author to one or more recipients.  Modern email operates across the Internet or other computer networks  Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging  Today's email systems are based on a store-and-forward model.  Email servers accept, forward, deliver and store messages (C) Anuradha Udunuwara
  • 77. 77 Source: http://en.flossmanuals.net/thunderbird/how-email-works/ (C) Anuradha Udunuwara
  • 78. 78 Source: http://www.linuxmail.info/how-email-works/ (C) Anuradha Udunuwara
  • 79. 79 Source: http://en.flossmanuals.net/thunderbird/how-email-works/ (C) Anuradha Udunuwara
  • 80. 80 SMTP Simple Mail Transport Protocol - These rules handle outgoing email and get your email from your computer to your friend's service provider. POP3 Post Office Protocol - These are the rules governing incoming email. It allows you to keep a set of messages on a server that mail client can access and download to your computer. Once the email is downloaded to your computer, it is usually deleted from the server. IMAP Internet Mail Access Protocol - This is a different set of rules governing incoming email. IMAP is more sophisticated than POP3. It allows you to keep messages on a server that you can access from multiple computers. With IMAP, you can use your mail client to access an email account from home and Outlook to do this from work and still keep all your messages on the server. (C) Anuradha Udunuwara
  • 81. Web on Internet 81  WWW  DNS  HTTP  HTTPS  HTML (C) Anuradha Udunuwara
  • 82. intranets 82  a computer network that uses IP technology to share information, operational systems, or computing services within an organization  Sometimes, refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure  may be composed of multiple LANs  objective is to organize each individual's desktop with minimal cost, time and effort to be more productive, cost efficient, timely, and competitive (C) Anuradha Udunuwara
  • 83. internet 83  a network between organizations  Internet vs. internet (C) Anuradha Udunuwara
  • 84. extranet 84  a computer network that allows controlled access from the outside, for specific business or educational purposes  In a business-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users  An extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network (C) Anuradha Udunuwara
  • 85. 85 Source: http://www.brighthub.com/computing/enterprise-security/articles/63387.aspx (C) Anuradha Udunuwara
  • 86. 86 Source: http://www.marketing-online.co.uk/book/ch01im01.html (C) Anuradha Udunuwara
  • 87. E-commerce 87  type of industry where buying and selling of product or service is conducted over electronic systems such as the Internet and other computer networks  E-commerce draws on such technologies as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, inventory management systems & automated data collection systems  Modern e-commerce typically uses the WWW at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices social media, and telephones as well (C) Anuradha Udunuwara
  • 88. About the Author 88 Eng. Anuradha Udunuwara is a Chartered Engineer by profession based in Sri Lanka. He has nearly a decade industry experience in strategy, architecture, engineering, design, plan, implementation and maintenance of CSP Networks using both packet-switched (PS) and Circuit-Switched (CS) technologies, along with legacy to NGN migration. Eng. Anuradha is a well-known in the field of CSP industry, both locally and internationally. Graduated from University of Peradeniya, Sri Lanka in 2001 with an honors in Electrical & Electronic Engineering, Eng. Anuradha is a corporate member of the Institution of Engineers Sri Lanka, a professional member of British Computer Society, a member of Institution of Electrical & Electronic Engineers, a member of Institution of Engineering & Technology (formerly Institution of Electrical Engineers), a member of the Computer Society of Sri Lanka, a life member of Sri Lanka Association for the Advancement of Science, senior member of the Carrier Ethernet Forum, member of the Internet Society, member of the Internet Strategy Forum, member of the Internet Strategy Forum Network, member of the Ethernet Academy, member of the NGN/IMS forum and member of the Peradeniya Engineering Faculty Alumni Association. He is also an ITIL foundation certified and the only MEF-CECP in the country. In his spare time Anuradha enjoys spending time with his family, playing badminton, photography, reading and travelling. He can be reached at udunuwara@ieee.org (C) Anuradha Udunuwara